| Chapter 39 –  | 
                                          Application Controls | 
                                        
                                     
                                        
                                    Myles Walsh
  Chapter Contents:
 
 
                                       
                                          |    | 
                                          39.1 | 
                                             | 
                                          Protection in Development
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          39.2 | 
                                             | 
                                          Protecting Online Files
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.1 | 
                                             | 
                                          Types of Data Corruption
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.2 | 
                                             | 
                                          Database Management Subsystem
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.2.1 | 
                                             | 
                                          Referential Integrity
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.2.2 | 
                                             | 
                                          Uniqueness Constraints
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.3 | 
                                             | 
                                          Lock on Update
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.3.1 | 
                                             | 
                                          Unconditional Versus Conditional Locking
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.3.2 | 
                                             | 
                                          Deadlocks
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.4 | 
                                             | 
                                          Two-Phase Commit
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.5 | 
                                             | 
                                          Backup Files and System Logs
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.6 | 
                                             | 
                                          Recovery and Restart
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.7 | 
                                             | 
                                          Backout
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.8 | 
                                             | 
                                          Roll-Forward Recovery
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.2.9 | 
                                             | 
                                          Distributed Databases
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.3 | 
                                             | 
                                          Protecting Batch Files
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          39.3.1 | 
                                             | 
                                          Backup File Creation
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.3.2 | 
                                             | 
                                          Audit Controls
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.4 | 
                                             | 
                                          Assuring that Information in the System is Valid
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          39.4.1 | 
                                             | 
                                          Validation Controls
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.4.1.1 | 
                                             | 
                                          Methods for Identifying Input Errors and Unauthorized Modifications
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          39.4.1.2 | 
                                             | 
                                          Range Checks
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          39.4.1.3 | 
                                             | 
                                          Validity Checks Using Tables
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          39.4.2 | 
                                             | 
                                          Diagnostic Utilities
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          39.5 | 
                                             | 
                                          Conclusion
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          39.6 | 
                                             | 
                                          For Further Reading
                                                 
                                           | 
                                        
                                     
  | 
                            
                         
                      | 
                  
                  
                      |